☆33Apr 20, 2022Updated 3 years ago
Alternatives and similar repositories for smugglebus
Users that are interested in smugglebus are comparing it to the libraries listed below
Sorting:
- ☆15Jul 20, 2022Updated 3 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 4 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- ☆16May 15, 2021Updated 4 years ago
- ☆110May 14, 2018Updated 7 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 3 months ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆53Aug 13, 2018Updated 7 years ago
- Go implementation of the Heaven's Gate technique☆102Feb 11, 2021Updated 5 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- Cross-platform proxy selection with optional native authentication negotiation☆53Feb 25, 2023Updated 3 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated last year
- ☆12Jun 16, 2021Updated 4 years ago
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago